咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 90 篇 期刊文献

馆藏范围

  • 236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 111 篇 计算机科学与技术...
    • 101 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 19 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 14 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 7 篇 training
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 sensors
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 57 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 9 篇 yang geng
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 lejun gong
  • 6 篇 dai hua
  • 6 篇 xu qianqian

语言

  • 232 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Security and Intelligent Processing Lab of Big Data"
236 条 记 录,以下是141-150 订阅
排序:
MNN: Mixed Nearest-Neighbors for Self-Supervised Learning
arXiv
收藏 引用
arXiv 2023年
作者: Long, Xianzhong Peng, Chen Li, Yun School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
In contrastive self-supervised learning, positive samples are typically drawn from the same image but in different augmented views, resulting in a relatively limited source of positive samples. An effective way to all... 详细信息
来源: 评论
Dafl: Domain Adaptation-Based Federated Learning for Privacy-Preserving Biometric Recognition
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zhousheng Yang, Geng Dai, Hua Bai, Yunlu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big data Security & Intelligent Processing Nanjing210023 China
With the introduction of data protection regulation in various countries, traditional centralized learning for the exploitation of sensitive biological information will gradually become unsustainable. We take face and... 详细信息
来源: 评论
UB-CQA: A user attribute based community question answering system
UB-CQA: A user attribute based community question answering ...
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Ziye Zhu Xiaoqian Liu Huakang Li Tao Li School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
intelligent Community Question Answering (CQA) system is a popular research topic in Natural Language processing (NLP) area. Recently, the development of distributed data mining has significantly improved the efficien... 详细信息
来源: 评论
Named entity recognition for Chinese telecommunications field based on Char2Vec and Bi-LSTMs
Named entity recognition for Chinese telecommunications fiel...
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Yu Wang Bin Xia Zheng Liu Yun Li Tao Li School of Computer Science Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Named Entity Recognition (NER) is a basic task in Natural Language processing (NLP), which extracts the meaningful named entities from the text. Compared with the English NER, the Chinese NER is more challenge, since ... 详细信息
来源: 评论
KCPMA: k-degree Contact Pattern Mining Algorithms for Moving Objects
KCPMA: k-degree Contact Pattern Mining Algorithms for Moving...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: You Chen Hua Dai Mingfeng Jiang Qu Lu Pengyue Li Bohan Li Geng Yang Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
During infectious disease outbreaks, tracking contacted objects is important for suppressing the spread of the virus and using trajectories of moving objects to discover contacted objects is one of effective approache... 详细信息
来源: 评论
Scheduling Rechargeable UAVs for Long Time Barrier Coverage
Scheduling Rechargeable UAVs for Long Time Barrier Coverage
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zhouqing Han Xiaojun Zhu Lijie Xu Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications China
We consider barrier coverage applications where a set of UAVs are deployed to monitor whether intruders pass through a line, i.e., the barrier. Due to limited energy supply of UAVs, a charging pile is used to recharge... 详细信息
来源: 评论
Sequential online prediction in the presence of outliers and change points: An instant temporal structure learning approach
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Bin Qi, Yu Chen, Ke-Jia School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing Jiangsu210023 China College of Computer Science and Technology Zhejiang University Hangzhou Zhejiang310058 China
In this paper, we consider sequential online prediction (SOP) for streaming data in the presence of outliers and change points. We propose an INstant TEmporal structure Learning (INTEL) algorithm to address this probl... 详细信息
来源: 评论
Temporal data fusion at the edge
arXiv
收藏 引用
arXiv 2019年
作者: Yang, Linfu Liu, Bin School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
—As an enabler technique, data fusion has gained great attention in the context of Internet of things (IoT). In traditional settings, data fusion is done at the cloud server. So the data to be fused should be transfe... 详细信息
来源: 评论
TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted data
TFS-index-based Multi-keyword Ranked Search Scheme Over Clou...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yinfu Deng Hua Dai Yuanlong Liu Zhangchen Li Geng Yang Xun Yi Nanjing University of Post and Telecommunication Nanjing China Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing University of Post and Telecommunication Nanjing China Royal Melbourne Institute of Technology University Melbourne Australia
Traditional searchable encryption schemes for clouds are generally based on TF-IDF vector space model, but they ignore the high-dimensional sparse characteristic of encrypted vectors. It will lead to substantial compu...
来源: 评论
Temporal data Fusion at the Edge
Temporal Data Fusion at the Edge
收藏 引用
IEEE International Symposium on Parallel and Distributed processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Linfu Yang Bin Liu School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an enabler technique, data fusion has gained great attention in the context of Internet of things (IoT). In traditional settings, data fusion is done at the cloud server. So the data to be fused should be transferr... 详细信息
来源: 评论